mirror of
https://github.com/DarkFlippers/unleashed-firmware.git
synced 2024-12-21 12:21:49 +03:00
224d0aefe4
* First part of multitarget porting * Delete firmware/targets/f7/Inc directory * Delete firmware/targets/f7/Src directory * gpio: cli fixes; about: using version from HAL * sdk: path fixes * gui: include fixes * applications: more include fixes * gpio: ported to new apis * hal: introduced furi_hal_target_hw.h; libs: added one_wire * hal: f18 target * github: also build f18 by default * typo fix * fbt: removed extra checks on app list * api: explicitly bundling select mlib headers with sdk * hal: f18: changed INPUT_DEBOUNCE_TICKS to match f7 * cleaned up commented out code * docs: added info on hw targets * docs: targets: formatting fixes * f18: fixed link error * f18: fixed API version to match f7 * docs: hardware: minor wording fixes * faploader: added fw target check * docs: typo fixes * github: not building komi target by default * fbt: support for `targets` field for built-in apps * github: reworked build flow to exclude app_set; fbt: removed komi-specific appset; added additional target buildset check * github: fixed build; nfc: fixed pvs warnings * attempt to fix target id * f7, f18: removed certain HAL function from public API * apps: debug: enabled bt_debug_app for f18 * Targets: backport input pins configuration routine from F7 to F18 Co-authored-by: Aleksandr Kutuzov <alleteam@gmail.com>
147 lines
6.3 KiB
C
147 lines
6.3 KiB
C
#include "nfc_supported_card.h"
|
|
#include "plantain_parser.h" // For plantain-specific stuff
|
|
|
|
#include <gui/modules/widget.h>
|
|
#include <nfc_worker_i.h>
|
|
|
|
#include <furi_hal.h>
|
|
|
|
static const MfClassicAuthContext two_cities_keys_4k[] = {
|
|
{.sector = 0, .key_a = 0xffffffffffff, .key_b = 0xffffffffffff},
|
|
{.sector = 1, .key_a = 0xffffffffffff, .key_b = 0xffffffffffff},
|
|
{.sector = 2, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
|
|
{.sector = 3, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
|
|
{.sector = 4, .key_a = 0xe56ac127dd45, .key_b = 0x19fc84a3784b},
|
|
{.sector = 5, .key_a = 0x77dabc9825e1, .key_b = 0x9764fec3154a},
|
|
{.sector = 6, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
|
|
{.sector = 7, .key_a = 0xffffffffffff, .key_b = 0xffffffffffff},
|
|
{.sector = 8, .key_a = 0xa73f5dc1d333, .key_b = 0xe35173494a81},
|
|
{.sector = 9, .key_a = 0x69a32f1c2f19, .key_b = 0x6b8bd9860763},
|
|
{.sector = 10, .key_a = 0xea0fd73cb149, .key_b = 0x29c35fa068fb},
|
|
{.sector = 11, .key_a = 0xc76bf71a2509, .key_b = 0x9ba241db3f56},
|
|
{.sector = 12, .key_a = 0xacffffffffff, .key_b = 0x71f3a315ad26},
|
|
{.sector = 13, .key_a = 0xffffffffffff, .key_b = 0xffffffffffff},
|
|
{.sector = 14, .key_a = 0xffffffffffff, .key_b = 0xffffffffffff},
|
|
{.sector = 15, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
|
|
{.sector = 16, .key_a = 0x72f96bdd3714, .key_b = 0x462225cd34cf},
|
|
{.sector = 17, .key_a = 0x044ce1872bc3, .key_b = 0x8c90c70cff4a},
|
|
{.sector = 18, .key_a = 0xbc2d1791dec1, .key_b = 0xca96a487de0b},
|
|
{.sector = 19, .key_a = 0x8791b2ccb5c4, .key_b = 0xc956c3b80da3},
|
|
{.sector = 20, .key_a = 0x8e26e45e7d65, .key_b = 0x8e65b3af7d22},
|
|
{.sector = 21, .key_a = 0x0f318130ed18, .key_b = 0x0c420a20e056},
|
|
{.sector = 22, .key_a = 0x045ceca15535, .key_b = 0x31bec3d9e510},
|
|
{.sector = 23, .key_a = 0x9d993c5d4ef4, .key_b = 0x86120e488abf},
|
|
{.sector = 24, .key_a = 0xc65d4eaa645b, .key_b = 0xb69d40d1a439},
|
|
{.sector = 25, .key_a = 0x3a8a139c20b4, .key_b = 0x8818a9c5d406},
|
|
{.sector = 26, .key_a = 0xbaff3053b496, .key_b = 0x4b7cb25354d3},
|
|
{.sector = 27, .key_a = 0x7413b599c4ea, .key_b = 0xb0a2AAF3A1BA},
|
|
{.sector = 28, .key_a = 0x0ce7cd2cc72b, .key_b = 0xfa1fbb3f0f1f},
|
|
{.sector = 29, .key_a = 0x0be5fac8b06a, .key_b = 0x6f95887a4fd3},
|
|
{.sector = 30, .key_a = 0x26973ea74321, .key_b = 0xd27058c6e2c7},
|
|
{.sector = 31, .key_a = 0xeb0a8ff88ade, .key_b = 0x578a9ada41e3},
|
|
{.sector = 32, .key_a = 0x7a396f0d633d, .key_b = 0xad2bdc097023},
|
|
{.sector = 33, .key_a = 0xa3faa6daff67, .key_b = 0x7600e889adf9},
|
|
{.sector = 34, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
|
|
{.sector = 35, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
|
|
{.sector = 36, .key_a = 0xa7141147d430, .key_b = 0xff16014fefc7},
|
|
{.sector = 37, .key_a = 0x8a8d88151a00, .key_b = 0x038b5f9b5a2a},
|
|
{.sector = 38, .key_a = 0xb27addfb64b0, .key_b = 0x152fd0c420a7},
|
|
{.sector = 39, .key_a = 0x7259fa0197c6, .key_b = 0x5583698df085},
|
|
};
|
|
|
|
bool two_cities_parser_verify(NfcWorker* nfc_worker, FuriHalNfcTxRxContext* tx_rx) {
|
|
furi_assert(nfc_worker);
|
|
UNUSED(nfc_worker);
|
|
|
|
if(nfc_worker->dev_data->mf_classic_data.type != MfClassicType4k) {
|
|
return false;
|
|
}
|
|
|
|
uint8_t sector = 4;
|
|
uint8_t block = mf_classic_get_sector_trailer_block_num_by_sector(sector);
|
|
FURI_LOG_D("2cities", "Verifying sector %d", sector);
|
|
if(mf_classic_authenticate(tx_rx, block, 0xe56ac127dd45, MfClassicKeyA)) {
|
|
FURI_LOG_D("2cities", "Sector %d verified", sector);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool two_cities_parser_read(NfcWorker* nfc_worker, FuriHalNfcTxRxContext* tx_rx) {
|
|
furi_assert(nfc_worker);
|
|
|
|
MfClassicReader reader = {};
|
|
FuriHalNfcDevData* nfc_data = &nfc_worker->dev_data->nfc_data;
|
|
reader.type = mf_classic_get_classic_type(nfc_data->atqa[0], nfc_data->atqa[1], nfc_data->sak);
|
|
for(size_t i = 0; i < COUNT_OF(two_cities_keys_4k); i++) {
|
|
mf_classic_reader_add_sector(
|
|
&reader,
|
|
two_cities_keys_4k[i].sector,
|
|
two_cities_keys_4k[i].key_a,
|
|
two_cities_keys_4k[i].key_b);
|
|
FURI_LOG_T("2cities", "Added sector %d", two_cities_keys_4k[i].sector);
|
|
}
|
|
|
|
return mf_classic_read_card(tx_rx, &reader, &nfc_worker->dev_data->mf_classic_data) == 40;
|
|
}
|
|
|
|
bool two_cities_parser_parse(NfcDeviceData* dev_data) {
|
|
MfClassicData* data = &dev_data->mf_classic_data;
|
|
|
|
// Verify key
|
|
MfClassicSectorTrailer* sec_tr = mf_classic_get_sector_trailer_by_sector(data, 4);
|
|
uint64_t key = nfc_util_bytes2num(sec_tr->key_a, 6);
|
|
if(key != two_cities_keys_4k[4].key_a) return false;
|
|
|
|
// =====
|
|
// PLANTAIN
|
|
// =====
|
|
|
|
// Point to block 0 of sector 4, value 0
|
|
uint8_t* temp_ptr = &data->block[4 * 4].value[0];
|
|
// Read first 4 bytes of block 0 of sector 4 from last to first and convert them to uint32_t
|
|
// 38 18 00 00 becomes 00 00 18 38, and equals to 6200 decimal
|
|
uint32_t balance =
|
|
((temp_ptr[3] << 24) | (temp_ptr[2] << 16) | (temp_ptr[1] << 8) | temp_ptr[0]) / 100;
|
|
// Read card number
|
|
// Point to block 0 of sector 0, value 0
|
|
temp_ptr = &data->block[0 * 4].value[0];
|
|
// Read first 7 bytes of block 0 of sector 0 from last to first and convert them to uint64_t
|
|
// 04 31 16 8A 23 5C 80 becomes 80 5C 23 8A 16 31 04, and equals to 36130104729284868 decimal
|
|
uint8_t card_number_arr[7];
|
|
for(size_t i = 0; i < 7; i++) {
|
|
card_number_arr[i] = temp_ptr[6 - i];
|
|
}
|
|
// Copy card number to uint64_t
|
|
uint64_t card_number = 0;
|
|
for(size_t i = 0; i < 7; i++) {
|
|
card_number = (card_number << 8) | card_number_arr[i];
|
|
}
|
|
|
|
// =====
|
|
// --PLANTAIN--
|
|
// =====
|
|
// TROIKA
|
|
// =====
|
|
|
|
uint8_t* troika_temp_ptr = &data->block[8 * 4 + 1].value[5];
|
|
uint16_t troika_balance = ((troika_temp_ptr[0] << 8) | troika_temp_ptr[1]) / 25;
|
|
troika_temp_ptr = &data->block[8 * 4].value[3];
|
|
uint32_t troika_number = 0;
|
|
for(size_t i = 0; i < 4; i++) {
|
|
troika_number <<= 8;
|
|
troika_number |= troika_temp_ptr[i];
|
|
}
|
|
troika_number >>= 4;
|
|
|
|
furi_string_printf(
|
|
dev_data->parsed_data,
|
|
"\e#Troika+Plantain\nPN: %llu-\nPB: %ld rur.\nTN: %ld\nTB: %d rur.\n",
|
|
card_number,
|
|
balance,
|
|
troika_number,
|
|
troika_balance);
|
|
|
|
return true;
|
|
}
|